November 5, 2025
M&S -Hacker claim responsibility for Jaguar Land Rover attack

M&S -Hacker claim responsibility for Jaguar Land Rover attack

A Jaguar Land Rover Sign at a car dealership
JLR said that there was no evidence that data had been stolen – Anna Barclay/Getty Images

The teen -hacking group, which Marks & Spencer has settled, has taken responsibility for the cyber attack, which forced the Jaguar Land Rover to close the lines of assembly.

The cyber groups scattered spiders and shiny hunters that they could have used an error in the IT systems of the automobile manufacturer. The groups said they were given access to customer data.

This could be susceptible to ransom requirements, since it is the systems painted online again.

It is unclear whether the company was issued a ransom demand or which data has been included.

The scattered spider, a loose collective of hackers, has been held responsible for a number of larger cyber disorders in the past few months-in one person in an impact on the attack on M&S, Co-OP and Harrods. M&S took months to recover from the hack.

The scattered spider is closely associated with a group that is known as Shiny Hunters, which stated that it was involved in the Targeting of JLR.

In addition to the Lapsus group, the two groups now describe themselves as “one and the same” and now style themselves as “scattered Lapsus hunters”.

It is believed that they mostly consist of teenagers and young men in English -speaking countries.

In July, three men of teenage and a 20-year-old woman were arrested in cooperation with the retail attacks.

A user of a telegram -messenger group, which is linked to scattered spiders and Shiny Hunters, published a screenshot that shows access to the internal systems of JLR.

A member of the group who only identified as Shiny informed the Telegraph that they had used a well -known error in a software provider of third -party providers to access customer data.

You did not say what type of data were taken or whether you had given a ransom demand.

With the error – in the software, which is known as SAP NetWeaver and the connection is linked to various computer programs, hacker code can be carried out on the computer systems of a target remote.

The US cyber agency, Cisa, warned at the beginning of this year of the mistake when he reported that Chinese hackers take advantage of him. JLR uses the NetWeaver software according to an online portal to access the company’s systems.

A software update to fix the error was published, but it is unclear whether JLR applied it.

JLR said on Tuesday that Proactive systems were closed, a potential reference to the software that the hackers claimed to be at risk.

The company said that “no evidence” saw that data was stolen, although this is rarely final in the early stages of an attack. For example, Koop initially stated that there were no signs that data was made before admitting that 6.5 million members had stolen information.

The Telegraph could not check the claims of the hackers, and JLR refused to comment on the identity of the attackers.

Leave a Reply

Your email address will not be published. Required fields are marked *